Wireless coexistence – New attack technique exploits Bluetooth, WiFi performance features for ‘inter-chip privilege escalation’
Attackers can use connections between wireless chips to steal data or credentials, researchers find [...]
Attackers can use connections between wireless chips to steal data or credentials, researchers find [...]